We propose a new type of variable coverage method called Dynamic Array Double-Access Attack (DADA Attack) in Ethereum Virtual Machine (EVM). Such attack can read and write operations anywhere in the storage area, resu...
详细信息
With the continuous development of quantum communication in recent years, quantum key distribution (QKD) has also become a key technology in the field of quantum communication. Due to the limitation of physical resour...
详细信息
In recent years, a large number of malware has spread indiscriminately, which causes various significant cyberspace security incidents all over the world. Therefore, malware detection has become one of the important r...
详细信息
The popularity of computers and networks brings many conveniences to our daily life but also brings a variety of security threats. The proliferation of attacks and the rapid spread of viruses make security researchers...
详细信息
Digital image steganography is one of the important ways to achieve covert communication to protect users’ data privacy. Steganalysis technology is the key technology to check the security of steganography, and the e...
详细信息
The lack of correlation between the new cyber attack intelligence and the knowledge database makes it difficult for the recommendation system to recommend effective cyber attack knowledge in terms of the new security ...
详细信息
HTTPS protocol is utilized to protect personal privacy in network communication by man-in-the-middle attacks. However, after the browser is attacked, this protection mechanism will be destroyed. This paper analyzes th...
详细信息
Sparse matrix vector multiplication is an important and commonly used computing kernel in scientific computing. Irregular arrangement of non zeros in sparse matrix leads to irregular memory access pattern, which in tu...
详细信息
The three-dimensional human body feature parameters extracted by the neural network method are coupled in the high-dimensional feature space. The fully connected network processes the three-dimensional human pose and ...
详细信息
Today most of the moving target defense decision-making methods are based on models of a discrete dynamic game. To more accurately study network attack-defense strategies against continuous confrontations, we analyze ...
详细信息
暂无评论